Security Issues in Cloud Computing



EOI: 10.11242/viva-tech.01.06.001

Download Full Text here



Citation

Prof. Krutika Vartak, Rupendra Kumar Jangid, "Security Issues in Cloud Computing", VIVA-IJRI Volume 1, Issue 6, Article MCA_01, pp. 1-6, 2023. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

Cloud computing has come a vital tool for businesses and individualities to store and access data and operations. Still, with the adding reliance on Cloud services comes an increased threat of security breaches and data loss. The security concerns in cloud computing, such as data breaches, unauthorized access, and lack of transparency, are explored in this paper. also, the paper explores implicit results to these issues, similar as enforcing strong authentication protocols, encryption, and regular security checkups. It's important for associations to be apprehensive of these security pitfalls and take applicable measures to cover their data and systems in the Cloud.

Keywords

Cloud computing, Data breaches, Data protection, Security audits, Security issues

References

  1. Q. Wang, N. Li, K. Ren, and W. Lou, "Toward secure and dependable storage services in cloud computing," IEEE Transactions on Services Computing, 12(2), 2019, pp. 266-279.
  2. A. Al-Fuqaha, M. Guizani, M. Mohammady, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications”, IEEE Communications Surveys & Tutorials, 17(4), 2015, pp. 2347-2376.
  3. J. Garcia-Alfaro, E. de Lara, and P. Veríssimo, "Cloud computing and data protection: A survey of legal and technical issues," IEEE Communications Surveys & Tutorials, 20(3), 2018, pp. 1778-1819.
  4. G. Wang, J. Zhang, and J. Li, "A survey on cloud service models," IEEE Access, 8, 2020, pp. 78532-78546.
  5. P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology, 53(6), 2011, pp. 50-53.
  6. G. Wei, Y. Chen, and Y. Liu, "A survey on cloud service models and architectures," IEEE Communications Surveys & Tutorials, 19(3), 2017, pp. 1617-1644.
  7. A. Beloglazov, R. Buyya, and J. Abawajy, "Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers," Concurrency and Computation: Practice and Experience, 25(13), 2013, pp. 1397-1420.
  8. S. Kshetri, "Cloud computing and information security,"Journal of Information Privacy and Security, 9(3), 2013, pp. 131-149.
  9. N. L. B. Pouwelse, P. J. A. Buhr, and M. J. G. Van Sinderen, "Cloud computing security challenges," Journal of Cloud Computing: Advances, Systems and Applications, 2(1), 2013, pp. 1-20.
  10. A. Alharbi, A. Alqahtani, and K. Alkhalaf, "A survey of cloud computing security issues," Journal of Network and Computer Applications, 36(6), 2013, pp. 1417-1432.
  11. S. S. Al-Saggaf, "Security issues in cloud computing: A survey," Journal of Information and Communication Technologies, 5(2), 2015, pp. 1-15.
  12. S. R. H. Raza, A. A. Al-Dubai, and T. Ahmed, "A comprehensive survey of security issues in cloud computing," Journal of Network and Computer Applications, 34(1), 2011, pp. 1-11.
  13. P. Mell, T. Grance, and K. Scarfone, Guidelines on security and privacy in public cloud computing (National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011).
  14. K. C. C. Chang, "Qualitative research: The field of the field”, Qualitative Research in Organizations and Management: An International Journal, 2(2), 2007, pp. 1-16.
  15. J. Creswell and V. Plano Clark, Designing and Conducting Mixed Methods Research (Sage, 2011).
  16. S. K. S. Gupta, "Cloud service providers' security measures," International Journal of Advanced Research in Computer Science and Software Engineering, 3(12), 2013, pp. 1-7.
  17. M. A. Sookhak, S. Khan, R. Z. Khan, A. Ghani, and M. H. Alam, "Security in cloud computing: Opportunities and challenges," Future Generation Computer Systems, 82, 2018, pp. 29-50.
  18. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, 34(1), 2011, pp. 1-11.
  19. M. Almorsy, J. Grundy, and A. Ibrahim, "Cloud computing security: A systematic literature review," Future Generation Computer Systems, 79, 2018, pp. 849-861.